From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (NAM10-BN7-obe.outbound.protection.outlook.com [40.107.92.85]) by mx.groups.io with SMTP id smtpd.web11.8204.1652448236209995114 for ; Fri, 13 May 2022 06:23:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@amd.com header.s=selector1 header.b=Y7XgdVqm; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.92.85, mailfrom: michael.roth@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DkK2tCtCthWc7DTs3xRKHSOIBB/c75Ji/XHIrXeF3Eeu7Oajp1GmOlIIaTmOosK7gxd9Wgrq5pU//+n5+DFytMb3h8U6L2H1zwKpRpMIqMoTAZrQFVlbbNWxShckGTnnaLStuoQfJd96/iz6XRWsUK8ykHhxLeZ+RK/KEEw2jITaEOEhByK13auUcYof7frlyAryXC1+ShOslV58+sKVQ/N4/4ZRYJ9rJxToXJSr2TWd2K5QbtWN9iIN70bcLWUai0LmtLs7HnRYSq0px0orklrwwRMCZLs+H77fbnZiealCysBNWc5MA9oSnU0uA7ff5ZDW4ycD1UasWID5I2GyqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hn/upq9Iou7n02HjPZNJBjBZZYnPUNKuK9BQufNPpIo=; b=bDJZpYdo4sw9NgM87qj0eCG24MWX6w2JazSpGPPyHmXDiDQbzbCT4qyWUyF1YtPoNFcHr2QvfR+DhXTMUPgzRvDcyxvZWYoC/mLNHQgg/Wq0Pm50MHFeITaAQWKGCpV3sxz7z/VVpWOIFv6bqM4mUg5YNbDJErQRwImNDQC9I6brcKtloWMJHFiB0JNQaSX0CmoECg8RqWR9NUYJjldRw6rhskf0JpwwdpTnjktnwE81cEsuH+BcC7K3Yv0eJF//qCm0tv5B8Grj0FotINwCq3KO/iBjP7jiCq/FB0H6JETllc+CdW0QAoeRRdNEG69w1A7zrsoN44gHpVDbeubOWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hn/upq9Iou7n02HjPZNJBjBZZYnPUNKuK9BQufNPpIo=; b=Y7XgdVqmLDtIyTTf864c4N2kux+oBkKwv9Bb+zHr2Qu76yE3So+TDWyn0Pe5moDBY2x412Bp3gjnapjADphS+aQhpnkuTgktS3+e471ja5WSuamo5ddLaDSKCxEFGIlXTUE0pLLmW6g03+DKBEO8dGAuIALHCX1via3qvtJlpy8= Received: from DM6PR04CA0001.namprd04.prod.outlook.com (2603:10b6:5:334::6) by BL0PR12MB5537.namprd12.prod.outlook.com (2603:10b6:208:1cc::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13; Fri, 13 May 2022 13:23:54 +0000 Received: from DM6NAM11FT013.eop-nam11.prod.protection.outlook.com (2603:10b6:5:334:cafe::b0) by DM6PR04CA0001.outlook.office365.com (2603:10b6:5:334::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13 via Frontend Transport; Fri, 13 May 2022 13:23:54 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT013.mail.protection.outlook.com (10.13.173.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5250.13 via Frontend Transport; Fri, 13 May 2022 13:23:53 +0000 Received: from localhost (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 13 May 2022 08:23:53 -0500 From: Michael Roth To: CC: Tom Lendacky Subject: [PATCH] UefiCpuPkg: Store SEV-SNP AP jump table in the secrets page Date: Fri, 13 May 2022 08:22:53 -0500 Message-ID: <20220513132253.397679-1-michael.roth@amd.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Return-Path: Michael.Roth@amd.com X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB03.amd.com (10.181.40.144) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: bba2c57b-8994-4b96-b01e-08da34e3d3b6 X-MS-TrafficTypeDiagnostic: BL0PR12MB5537:EE_ X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(40470700004)(36840700001)(6916009)(36756003)(70206006)(70586007)(8676002)(82310400005)(8936002)(356005)(81166007)(83380400001)(4326008)(316002)(508600001)(16526019)(5660300002)(336012)(47076005)(426003)(44832011)(26005)(19627235002)(2616005)(186003)(2906002)(1076003)(86362001)(40460700003)(36860700001)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 May 2022 13:23:53.9438 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bba2c57b-8994-4b96-b01e-08da34e3d3b6 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT013.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR12MB5537 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain A full-featured SEV-SNP guest will not rely on the AP jump table, and will instead use the AP Creation interface defined by the GHCB. However, a guest is still allowed to use the AP jump table if desired. However, unlike with SEV-ES guests, SEV-SNP guests should not store/retrieve the jump table address via GHCB requests to the hypervisor, they should instead store/retrieve it via the SEV-SNP secrets page. Implement the store side of this for OVMF. Suggested-by: Tom Lendacky Signed-off-by: Michael Roth --- MdePkg/Include/AmdSevSnpSecretsPage.h | 51 +++++++++++++++++++ MdePkg/MdePkg.dec | 4 ++ OvmfPkg/AmdSev/AmdSevX64.dsc | 3 ++ OvmfPkg/CloudHv/CloudHvX64.dsc | 3 ++ OvmfPkg/IntelTdx/IntelTdxX64.dsc | 3 ++ OvmfPkg/Microvm/MicrovmX64.dsc | 3 ++ OvmfPkg/OvmfPkgIa32.dsc | 3 ++ OvmfPkg/OvmfPkgIa32X64.dsc | 3 ++ OvmfPkg/OvmfPkgX64.dsc | 3 ++ OvmfPkg/PlatformPei/AmdSev.c | 5 ++ OvmfPkg/PlatformPei/PlatformPei.inf | 1 + UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf | 1 + UefiCpuPkg/Library/MpInitLib/DxeMpLib.c | 9 ++++ 13 files changed, 92 insertions(+) create mode 100644 MdePkg/Include/AmdSevSnpSecretsPage.h diff --git a/MdePkg/Include/AmdSevSnpSecretsPage.h b/MdePkg/Include/AmdSevS= npSecretsPage.h new file mode 100644 index 0000000000..55c7475ff0 --- /dev/null +++ b/MdePkg/Include/AmdSevSnpSecretsPage.h @@ -0,0 +1,51 @@ +/** @file=0D +Definitions for AMD SEV-SNP Secrets Page=0D +=0D +Copyright (c) 2022 AMD Inc. All rights reserved.
=0D +SPDX-License-Identifier: BSD-2-Clause-Patent=0D +=0D +**/=0D +=0D +#ifndef AMD_SEV_SNP_SECRETS_PAGE_H_=0D +#define AMD_SEV_SNP_SECRETS_PAGE_H_=0D +=0D +//=0D +// OS-defined area of secrets page=0D +//=0D +// As defined by "SEV-ES Guest-Hypervisor Communication Block Standardizat= ion",=0D +// revision 1.50, section 2.7, "SEV-SNP Secrets Page".=0D +//=0D +typedef PACKED struct _SNP_SECRETS_OS_AREA {=0D + UINT32 MsgSeqNum0;=0D + UINT32 MsgSeqNum1;=0D + UINT32 MsgSeqNum2;=0D + UINT32 MsgSeqNum3;=0D + UINT64 ApJumpTablePa;=0D + UINT8 Reserved[40];=0D + UINT8 GuestUsage[32];=0D +} SNP_SECRETS_OS_AREA;=0D +=0D +#define VMPCK_KEY_LEN 32=0D +=0D +//=0D +// SEV-SNP Secrets page=0D +//=0D +// As defined by "SEV-SNP Firmware ABI", revision 1.51, section 8.17.2.5,= =0D +// "PAGE_TYPE_SECRETS".=0D +//=0D +typedef PACKED struct _SNP_SECRETS_PAGE {=0D + UINT32 Version;=0D + UINT32 ImiEn : 1,=0D + Reserved : 31;=0D + UINT32 Fms;=0D + UINT32 Reserved2;=0D + UINT8 Gosvw[16];=0D + UINT8 Vmpck0[VMPCK_KEY_LEN];=0D + UINT8 Vmpck1[VMPCK_KEY_LEN];=0D + UINT8 Vmpck2[VMPCK_KEY_LEN];=0D + UINT8 Vmpck3[VMPCK_KEY_LEN];=0D + SNP_SECRETS_OS_AREA OsArea;=0D + UINT8 Reserved3[3840];=0D +} SNP_SECRETS_PAGE;=0D +=0D +#endif=0D diff --git a/MdePkg/MdePkg.dec b/MdePkg/MdePkg.dec index f1ebf9e251..a365bfcfe8 100644 --- a/MdePkg/MdePkg.dec +++ b/MdePkg/MdePkg.dec @@ -2417,5 +2417,9 @@ # @Prompt Memory encryption attribute=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0|UINT64|0x00= 00002e=0D =0D + ## This dynamic PCD indicates the location of the SEV-SNP secrets page.= =0D + # @Prompt SEV-SNP secrets page address=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0|UINT64|0x0000002f=0D +=0D [UserExtensions.TianoCore."ExtraFiles"]=0D MdePkgExtra.uni=0D diff --git a/OvmfPkg/AmdSev/AmdSevX64.dsc b/OvmfPkg/AmdSev/AmdSevX64.dsc index f0700035c1..02306945fd 100644 --- a/OvmfPkg/AmdSev/AmdSevX64.dsc +++ b/OvmfPkg/AmdSev/AmdSevX64.dsc @@ -575,6 +575,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D !include OvmfPkg/OvmfTpmPcds.dsc.inc=0D =0D gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000=0D diff --git a/OvmfPkg/CloudHv/CloudHvX64.dsc b/OvmfPkg/CloudHv/CloudHvX64.dsc index d1c85f60c7..7143698253 100644 --- a/OvmfPkg/CloudHv/CloudHvX64.dsc +++ b/OvmfPkg/CloudHv/CloudHvX64.dsc @@ -630,6 +630,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D [PcdsDynamicHii]=0D !include OvmfPkg/OvmfTpmPcdsHii.dsc.inc=0D =0D diff --git a/OvmfPkg/IntelTdx/IntelTdxX64.dsc b/OvmfPkg/IntelTdx/IntelTdxX6= 4.dsc index 80c331ea23..b19718c572 100644 --- a/OvmfPkg/IntelTdx/IntelTdxX64.dsc +++ b/OvmfPkg/IntelTdx/IntelTdxX64.dsc @@ -512,6 +512,9 @@ =0D gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D ##########################################################################= ######=0D #=0D # Components Section - list of all EDK II Modules needed by this Platform.= =0D diff --git a/OvmfPkg/Microvm/MicrovmX64.dsc b/OvmfPkg/Microvm/MicrovmX64.dsc index 20c3c9c4d8..42673c29ee 100644 --- a/OvmfPkg/Microvm/MicrovmX64.dsc +++ b/OvmfPkg/Microvm/MicrovmX64.dsc @@ -613,6 +613,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D ##########################################################################= ######=0D #=0D # Components Section - list of all EDK II Modules needed by this Platform.= =0D diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc index 533bbdb435..8ffef069a3 100644 --- a/OvmfPkg/OvmfPkgIa32.dsc +++ b/OvmfPkg/OvmfPkgIa32.dsc @@ -649,6 +649,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D !if $(CSM_ENABLE) =3D=3D FALSE=0D gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000=0D !endif=0D diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc index cb68e612bd..0b4d5001b2 100644 --- a/OvmfPkg/OvmfPkgIa32X64.dsc +++ b/OvmfPkg/OvmfPkgIa32X64.dsc @@ -657,6 +657,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D !if $(CSM_ENABLE) =3D=3D FALSE=0D gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000=0D !endif=0D diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc index 71526bba31..3a3223be6b 100644 --- a/OvmfPkg/OvmfPkgX64.dsc +++ b/OvmfPkg/OvmfPkgX64.dsc @@ -680,6 +680,9 @@ # Set ConfidentialComputing defaults=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0=0D =0D + # Set SEV-SNP Secrets page address default=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress|0=0D +=0D !if $(CSM_ENABLE) =3D=3D FALSE=0D gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000=0D !endif=0D diff --git a/OvmfPkg/PlatformPei/AmdSev.c b/OvmfPkg/PlatformPei/AmdSev.c index 385562b44c..70352ca43b 100644 --- a/OvmfPkg/PlatformPei/AmdSev.c +++ b/OvmfPkg/PlatformPei/AmdSev.c @@ -408,6 +408,11 @@ AmdSevInitialize ( //=0D if (MemEncryptSevSnpIsEnabled ()) {=0D PcdStatus =3D PcdSet64S (PcdConfidentialComputingGuestAttr, CCAttrAmdS= evSnp);=0D + ASSERT_RETURN_ERROR (PcdStatus);=0D + PcdStatus =3D PcdSet64S (=0D + PcdSevSnpSecretsAddress,=0D + (UINT64)(UINTN)PcdGet32 (PcdOvmfSnpSecretsBase)=0D + );=0D } else if (MemEncryptSevEsIsEnabled ()) {=0D PcdStatus =3D PcdSet64S (PcdConfidentialComputingGuestAttr, CCAttrAmdS= evEs);=0D } else {=0D diff --git a/OvmfPkg/PlatformPei/PlatformPei.inf b/OvmfPkg/PlatformPei/Plat= formPei.inf index 00372fa0eb..c688e4ee24 100644 --- a/OvmfPkg/PlatformPei/PlatformPei.inf +++ b/OvmfPkg/PlatformPei/PlatformPei.inf @@ -114,6 +114,7 @@ gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr=0D gUefiCpuPkgTokenSpaceGuid.PcdGhcbHypervisorFeatures=0D gEfiMdeModulePkgTokenSpaceGuid.PcdTdxSharedBitMask=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress=0D =0D [FixedPcd]=0D gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase=0D diff --git a/UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf b/UefiCpuPkg/Lib= rary/MpInitLib/DxeMpInitLib.inf index e1cd0b3500..d8cfddcd82 100644 --- a/UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf +++ b/UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf @@ -80,3 +80,4 @@ gEfiMdeModulePkgTokenSpaceGuid.PcdCpuStackGuard ## = CONSUMES=0D gEfiMdeModulePkgTokenSpaceGuid.PcdGhcbBase ## = CONSUMES=0D gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr ## = CONSUMES=0D + gEfiMdePkgTokenSpaceGuid.PcdSevSnpSecretsAddress ## = CONSUMES=0D diff --git a/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c b/UefiCpuPkg/Library/M= pInitLib/DxeMpLib.c index 60d14a5a0e..6014dce136 100644 --- a/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c +++ b/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c @@ -15,6 +15,7 @@ #include =0D #include =0D #include =0D +#include =0D =0D #include =0D =0D @@ -216,6 +217,14 @@ GetSevEsAPMemory ( =0D DEBUG ((DEBUG_INFO, "Dxe: SevEsAPMemory =3D %lx\n", (UINTN)StartAddress)= );=0D =0D + if (ConfidentialComputingGuestHas (CCAttrAmdSevSnp)) {=0D + SNP_SECRETS_PAGE *Secrets =3D (SNP_SECRETS_PAGE *)(INTN)PcdGet64 (Pcd= SevSnpSecretsAddress);=0D +=0D + Secrets->OsArea.ApJumpTablePa =3D (UINT64)(UINTN)StartAddress;=0D +=0D + return (UINTN)StartAddress;=0D + }=0D +=0D //=0D // Save the SevEsAPMemory as the AP jump table.=0D //=0D --=20 2.25.1